2022
DOI: 10.1155/2022/4948190
|View full text |Cite
|
Sign up to set email alerts
|

Vampire Attack Mitigation and Network Performance Improvement Using Probabilistic Fuzzy Chain Set with Authentication Routing Protocol and Hybrid Clustering-Based Optimization in Wireless Sensor Network

Abstract: The most effective threat for wireless sensor networks (WSN) is Vampire attacks on sensor nodes as they can stretch the network connectivity among them and influence the network’s energy, which can drain the network. Vampire attack has particular malicious nature of sensor nodes in which they can widely exploit features of combined routing protocol. Fuzzy rules and fuzzy sets are highly optimal techniques in mitigating the vampire attacks of the network, which can quantify the uncertain behaviour of sensor nod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…Lulwah M. Alkwai [18] introduced a probabilistic fuzzy chain set, authentication based routing protocol and hybrid clustering (PFCS-ARP-HC) algorithm. Using probability calculations, this system used a fuzzy-based chain rule set to successfully minimize vampire assaults.…”
Section: Literature Surveymentioning
confidence: 99%
See 3 more Smart Citations
“…Lulwah M. Alkwai [18] introduced a probabilistic fuzzy chain set, authentication based routing protocol and hybrid clustering (PFCS-ARP-HC) algorithm. Using probability calculations, this system used a fuzzy-based chain rule set to successfully minimize vampire assaults.…”
Section: Literature Surveymentioning
confidence: 99%
“…The fitness employed in the ASO-based route creation is shown in Eqs. (18)(19)(20)(21)(22). This aids in identifying the route with the most residual energy, shortest transmission distance, and highest security.…”
Section: Tcrp Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Such electrodes are replaced during the next battery repair. With significant and progressive casting, it is necessary to replace all the positive electrodes in the battery with new ones [15]. Replace only the distracting electrodes with new ones.…”
Section: Introductionmentioning
confidence: 99%